The Cisco ASA 5510 is a hardware security appliance for enterprise-level computer networks. Among other functions, an ASA 5510 can operate as a firewall that makes only some hosts behind the firewall visible from the open Internet --- and performs Network Address Translation (NAT) for them. Even if an ASA 5510 has a single network interface on the Internet side, the administrator can still assign multiple public IP addresses to that interface. Each public IP address can get mapped by NAT to a host behind the firewall, or to the configuration interface of the ASA 5510.
- Skill level:
Things you need
- Administrator access to the ASA 5510
- Console cable for the ASA 5510
Connect your computer to the ASA 5510 using the console cable. Invoke the terminal emulator on the computer with parameters:
8 data bits
1 stop bit
no flow control.
Press "Enter" to see the "hostname>" prompt from the ASA 5510. Execute the command "enable" (without quotes) to get into privileged mode. You will have to enter the administrator password.
Enter the configuration commands using the command line, one by one and pressing "Enter" after each one. The "static" configuration command maps external addresses to internal addresses (Static NAT). The concrete sequence of commands depends on your situation. For example, if you want to configure the ASA 5510 to use public IP addresses 184.108.40.206 and 220.127.116.11 for internal hosts 192.168.100.1 and 192.168.100.3, respectively, enter these commands:
static (inside,outside) 18.104.22.168 192.168.100.1
static (inside,outside) 22.214.171.124 192.168.100.3
The ASA 5510 is now configured for multiple public IP addresses.
- 20 of the funniest online reviews ever
- 14 Biggest lies people tell in online dating sites
- Hilarious things Google thinks you're trying to search for